Virtualization solutions isolate their VM systems far more effectively than a container host isolates its guests. However, implementation weaknesses in the hypervisor and configuration errors can lead to residual risk, as we show, using KVM as an example.
Any OpenStack installation that hosts services and VMs for several customers poses a challenge for the security-conscious admin. Hardening the overall system can turn the porous walls into a fortress – but you'll need more than a little mortar.
VMware's NSX for vSphere platform adds security to microsegmentation, allowing security components to analyze traffic within the hypervisor.
Although developers appreciate Docker's ease of use and flexibility, many admins are worried about vulnerabilities. We look at various approaches to securing container images and the price to be paid.
Microsegmentation promises substantial improvements over classic architectures for the protection of applications and increased security when building out the efficiency of a data center.
Serious distributions try to protect their repositories cryptographically against tampering and transmission errors. Arch Linux, Debian, Fedora, openSUSE, and Ubuntu all take different, complex, but conceptually similar approaches.
Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
The Bro security framework takes a new approach to security monitoring, with the emphasis on trends and long-term analysis.
With the resurgence of sophisticated macro virus attacks, new countermeasures are in order. We offer a few recommendations.
The focus in SQL Server 2016 is on mobility, cloud usage, and speed, with improvements to in-memory processing and security.